Endpoint March 6, 2016 Stanford University IT Department Makes the Grade With IBM BigFix 2 min read - At InterConnect 2016, the IT team from Stanford University detailed how IBM BigFix helped them lock down data without sacrificing the user experience.
Endpoint February 24, 2016 Global Payments, Inc. Teams With IBM BigFix to Track Endpoints, Maintain PCI Compliance 2 min read - At IBM InterConnect 2016, Darren Kroll of Global Payments, Inc. described how IBM BigFix made PCI compliance and auditing easier.
Cloud Security February 22, 2016 Innovative New Solutions for Securing the Internet of Things 6 min read - The grave state of security in the Internet of Things is rarely addressed by the industry, but IBM Security has been developing innovative solutions.
Data Protection February 22, 2016 It’s Not Rocket Science — It’s Data Security 3 min read - Modern data security can be difficult for organizations, but the solution is often to approach it in a simpler, more actionable manner.
Endpoint February 21, 2016 Simplifying Enterprise Mobile Security at InterConnect 2016 2 min read - Choosing the right mobile security technologies for your organization first requires the recognition of the objectives you are trying to achieve.
Data Protection February 20, 2016 Find the Map, Locate the Treasure and Keep the Pirates Away, Part II: Seven More Data Security and Privacy Best Practices 3 min read - The best practices of the data privacy game include having a treasure map, defending against pirates and preparing for battle.
Advanced Threats February 20, 2016 Thingbots: The Future of Botnets in the Internet of Things 2 min read - Thingbots are poised to be the next major threat on the cyber landscape, attacking devices connected to the Internet of Things.
Intelligence & Analytics February 19, 2016 Your Best Bet in Las Vegas: IBM Security Intelligence and Analytics 3 min read - There's a lot you can learn at the Security Intelligence and Analytics track at InterConnect 2016. Here are some of the most interesting options.
Identity & Access February 18, 2016 Identity Is the New Perimeter 3 min read - Verifying the user identity and adding context to access requests are vital in today's digital world. Do you have the skills needed to take this step?
Intelligence & Analytics February 17, 2016 Supporting Data Security Analytics With a Software Inventory Solution 2 min read - Enterprises may be devoting a lot of resources to software licenses and maintenance, but they can locate these areas of inefficiency with new solutions.